咨询与建议

限定检索结果

文献类型

  • 2,472 篇 会议
  • 2,118 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,591 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,159 篇 工学
    • 2,217 篇 计算机科学与技术...
    • 1,822 篇 软件工程
    • 787 篇 信息与通信工程
    • 395 篇 控制科学与工程
    • 376 篇 生物工程
    • 339 篇 电气工程
    • 305 篇 电子科学与技术(可...
    • 268 篇 光学工程
    • 226 篇 机械工程
    • 214 篇 生物医学工程(可授...
    • 192 篇 化学工程与技术
    • 139 篇 仪器科学与技术
    • 111 篇 动力工程及工程热...
    • 97 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 79 篇 交通运输工程
    • 79 篇 安全科学与工程
  • 1,783 篇 理学
    • 936 篇 数学
    • 530 篇 物理学
    • 418 篇 生物学
    • 283 篇 统计学(可授理学、...
    • 198 篇 化学
    • 126 篇 系统科学
  • 889 篇 管理学
    • 479 篇 图书情报与档案管...
    • 440 篇 管理科学与工程(可...
    • 156 篇 工商管理
  • 179 篇 医学
    • 152 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 106 篇 法学
    • 92 篇 社会学
  • 60 篇 农学
  • 46 篇 教育学
  • 44 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 177 篇 semantics
  • 162 篇 feature extracti...
  • 118 篇 training
  • 85 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 60 篇 image segmentati...
  • 52 篇 data mining
  • 50 篇 visualization
  • 48 篇 computer science
  • 48 篇 contrastive lear...
  • 47 篇 optimization
  • 47 篇 convolutional ne...
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 43 篇 computer vision
  • 43 篇 robustness
  • 42 篇 machine learning

机构

  • 161 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 114 篇 school of comput...
  • 94 篇 college of compu...
  • 90 篇 provincial key l...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,193 篇 英文
  • 298 篇 其他
  • 105 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Computer Information Processing Technology"
4591 条 记 录,以下是381-390 订阅
排序:
HighlightRemover: Spatially Valid Pixel Learning for Image Specular Highlight Removal  24
HighlightRemover: Spatially Valid Pixel Learning for Image S...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Ling Ma, Yidong Jiang, Zhi He, Weilei Bao, Zhongyun Fu, Gang Xu, Wenju Xiao, Chunxia School of Computer Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Realtime Industrial Systems Wuhan University of Science and Technology Wuhan China School of Computer Science Wuhan University Wuhan China Department of Computing Hong Kong Polytechnic University Hong Kong Amazon Palo Alto United States
Recently, learning-based methods have made significant progress for image specular highlight removal. However, many of these approaches treat all the image pixels uniformly, overlooking the negative impact of invalid ... 详细信息
来源: 评论
The Hidden-Layers Topology Analysis of Deep Learning Models in Survey for Forecasting and Generation of the Wind Power and Photovoltaic Energy
收藏 引用
computer Modeling in Engineering & Sciences 2022年 第5期131卷 567-597页
作者: Dandan Xu Haijian Shao Xing Deng Xia Wang School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China School of Automation Key Laboratory of Measurement and Control for CSEMinistry of EducationSoutheast UniversityNanjing210096China School of Information Science and Technology Nantong UniversityNantong226019China
As wind and photovoltaic energy become more prevalent,the optimization of power systems is becoming increasingly *** current state of research in renewable generation and power forecasting technology,such as wind and ... 详细信息
来源: 评论
CAMG: Context-Aware Moment Graph Network for Multimodal Temporal Activity Localization via Language  12th
CAMG: Context-Aware Moment Graph Network for Multimodal Tem...
收藏 引用
12th National CCF Conference on Natural Language processing and Chinese Computing, NLPCC 2023
作者: Hu, Yuelin Xu, Yuanwu Zhang, Yuejie Feng, Rui Zhang, Tao Lu, Xuequan Gao, Shang School of Computer Science Shanghai Key Laboratory of Intelligent Information Processing Shanghai Collaborative Innovation Center of Intelligent Visual Computing Fudan University Shanghai200433 China School of Information Management and Engineering Shanghai Key Laboratory of Financial Information Technology Shanghai University of Finance and Economics Shanghai200433 China School of Information Technology Deakin University Waurn PondsVIC3216 Australia
Temporal Activity Localization via Language (TALL) is a challenging task for language based video understanding, especially when a video contains multiple moments of interest and the language query has words describin... 详细信息
来源: 评论
A Policy-Controlled Signature Scheme for end-to-end Secure Communication  12
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Yu, Feng Meng, Linghui Xi, Jing Li, Xianxian Lu, Qianhui Zhu, Weidong Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology GuiLin China University of SouthEast Jiangsu Provincial Key Laboratory of Netwrok and Information Security Nanjing China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
Towards DDIs Identification by Knowledge Graph with BiRW and Back Aggregation
Towards DDIs Identification by Knowledge Graph with BiRW and...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Yin, Zhuang Lin, Xiaoli Zhang, Xiaolong Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-time Industrial System School of Computer Science and Technology Wuhan China
Effective identification of potential drug-drug interactions (DDIs) can prevent adverse effects caused by DDIs to a certain extent. This paper proposes the new hybrid method for predicting DDIs, which is called BiRW-K... 详细信息
来源: 评论
Dynamic Fusion Nearest Neighbor Machine Translation via Dempster-Shafer Theory  1
收藏 引用
18th China Conference on Machine Translation, CCMT 2022
作者: Yang, Zongheng Hou, Hongxu Sun, Shuo Wu, Nier Wang, Yisong Jian, Weichen Wang, Pengcong College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Mongolian Information Processing Technology Hohhot China
kNN-MT has been recently proposed, uses a token-level k-nearest neighbor approach to retrieve similar sentences, obtaining knowledge guidance from an external memory module, and then combined with the prediction resul... 详细信息
来源: 评论
A Belief Propagation Cooperative Localization Algorithm in GNSS-Loss Environments  3
A Belief Propagation Cooperative Localization Algorithm in G...
收藏 引用
3rd International Conference on Digital Signal and computer Communications, DSCC 2023
作者: Ma, Fei Tan, Guoping Zhou, Siyuan Hu, Hexuan College of Computer and Information Hohai University Jiangsu Intelligent Transportation and Intelligent Driving Research Institute Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University College of Computer and Information Hohai University Nanjing China
When vehicles are in driving environments such as urban roads and tunnels, the global navigation satellite system (GNSS) signal can fail to achieve positioning due to occlusion. Cooperative positioning can effectively... 详细信息
来源: 评论
Monotonic and nonmonotonic gentzen deduction systems for L_(3)-valued propositional logic
收藏 引用
Frontiers of computer Science 2021年 第3期15卷 123-135页
作者: Cungen CAO Lanxi HU Yuefei SUI Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China
A sequent is a pair(Г,△),which is true under an as-signment if either some formula inГis false,or some formula in △ is *** L3-valued propositional logic,a mulisequent is a triple △|Θ|Г,which is true under an as... 详细信息
来源: 评论
Graph Contrastive Learning with Learnable Graph Augmentation  48
Graph Contrastive Learning with Learnable Graph Augmentation
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Pu, Xinyan Zhang, Ke Shu, Huazhong Coatrieux, Jean Louis Kong, Youyong Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Universit de Rennes 1 Ltsi Rennes France Centre de Recherche en Information BioMdicale Sino-Franais Rennes France
Graph contrastive learning has gained popularity due to its success in self-supervised graph representation learning. Augmented views in contrastive learning greatly determine the quality of the learned representation... 详细信息
来源: 评论
Convertible certificateless proxy re-signcryption for data access control in cloud computing
Convertible certificateless proxy re-signcryption for data a...
收藏 引用
2023 International Conference on computer Application and information Security, ICCAIS 2023
作者: Wu, Chenhuang Yang, Linghui Yuan, Beibei Li, Huimin Huang, Hui Fujian Key Laboratory of Financial Information Processing Putian University Fujian Putian351100 China Fujian Zhongxin Network Security Information Technology Co. Ltd. Fujian Fuzhou350011 China School of Computer Science Minnan Normal University Fujian Zhangzhou363000 China
Cloud storage service enables users not only to save their local data storage costs but also to access their outsourced data at any time and anywhere. Traditionally, a data owner outsources the encrypted data to the c... 详细信息
来源: 评论